chiark / gitweb /
Expunge CVS cruft.
[tripe] / admin.c
... / ...
CommitLineData
1/* -*-c-*-
2 *
3 * $Id: admin.c,v 1.10 2004/04/08 01:36:17 mdw Exp $
4 *
5 * Admin interface for configuration
6 *
7 * (c) 2001 Straylight/Edgeware
8 */
9
10/*----- Licensing notice --------------------------------------------------*
11 *
12 * This file is part of Trivial IP Encryption (TrIPE).
13 *
14 * TrIPE is free software; you can redistribute it and/or modify
15 * it under the terms of the GNU General Public License as published by
16 * the Free Software Foundation; either version 2 of the License, or
17 * (at your option) any later version.
18 *
19 * TrIPE is distributed in the hope that it will be useful,
20 * but WITHOUT ANY WARRANTY; without even the implied warranty of
21 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 * GNU General Public License for more details.
23 *
24 * You should have received a copy of the GNU General Public License
25 * along with TrIPE; if not, write to the Free Software Foundation,
26 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
27 */
28
29/*----- Header files ------------------------------------------------------*/
30
31#include "tripe.h"
32
33/*----- Global variables --------------------------------------------------*/
34
35#ifndef NTRACE
36
37const trace_opt tr_opts[] = {
38 { 't', T_TUNNEL, "tunnel events" },
39 { 'r', T_PEER, "peer events" },
40 { 'a', T_ADMIN, "admin interface" },
41 { 'p', T_PACKET, "packet contents" },
42 { 'c', T_CRYPTO, "crypto details" },
43 { 's', T_KEYSET, "symmetric keyset management" },
44 { 'x', T_KEYEXCH, "key exchange" },
45 { 'm', T_KEYMGMT, "key management" },
46 { 'A', T_ALL, "all of the above" },
47 { 0, 0, 0 }
48};
49
50unsigned tr_flags = 0;
51#endif
52
53/*----- Static variables --------------------------------------------------*/
54
55static admin *admins;
56static sel_file sock;
57static const char *sockname;
58static unsigned flags = 0;
59static admin *a_stdin = 0;
60static sig s_term, s_int, s_hup;
61
62#define F_DAEMON 1u
63#define F_INIT 2u
64
65#define T_RESOLVE SEC(30)
66
67static void a_destroy(admin */*a*/);
68static void a_lock(admin */*a*/);
69static void a_unlock(admin */*a*/);
70
71/*----- Output functions --------------------------------------------------*/
72
73/* --- @trywrite@ --- *
74 *
75 * Arguments: @admin *a@ = pointer to an admin block
76 * @const char *p@ = pointer to buffer to write
77 * @size_t sz@ = size of data to write
78 *
79 * Returns: The number of bytes written, or less than zero on error.
80 *
81 * Use: Attempts to write data to a client.
82 */
83
84static ssize_t trywrite(admin *a, const char *p, size_t sz)
85{
86 ssize_t n, done = 0;
87
88again:
89 if (!sz)
90 return (done);
91 n = write(a->w.fd, p, sz);
92 if (n > 0) {
93 done += n;
94 p += n;
95 sz -= n;
96 goto again;
97 }
98 if (n < 0) {
99 if (errno == EINTR)
100 goto again;
101 if (errno != EAGAIN && errno != EWOULDBLOCK) {
102 a_destroy(a);
103 a_warn("disconnecting admin client due to write errors: %s",
104 strerror(errno));
105 return (-1);
106 }
107 }
108 return (done);
109}
110
111/* --- @dosend@ --- *
112 *
113 * Arguemnts: @admin *a@ = pointer to an admin block
114 * @const char *p@ = pointer to buffer to write
115 * @size_t sz@ = size of data to write
116 *
117 * Returns: ---
118 *
119 * Use: Sends data to an admin client.
120 */
121
122static void dosend(admin *a, const char *p, size_t sz)
123{
124 ssize_t n;
125 obuf *o;
126
127 if (a->f & AF_DEAD)
128 return;
129
130 /* --- Try to send the data immediately --- */
131
132 if (!a->o_head) {
133 if ((n = trywrite(a, p, sz)) < 0)
134 return;
135 p += n;
136 sz -= n;
137 if (!sz)
138 return;
139 }
140
141 /* --- Fill buffers with the data until it's all gone --- */
142
143 o = a->o_tail;
144 if (!o)
145 sel_addfile(&a->w);
146 else if (o->p_in < o->buf + OBUFSZ)
147 goto noalloc;
148
149 do {
150 o = xmalloc(sizeof(obuf));
151 o->next = 0;
152 o->p_in = o->p_out = o->buf;
153 if (a->o_tail)
154 a->o_tail->next = o;
155 else
156 a->o_head = o;
157 a->o_tail = o;
158
159 noalloc:
160 n = o->buf + OBUFSZ - o->p_in;
161 if (n > sz)
162 n = sz;
163 memcpy(o->p_in, p, n);
164 o->p_in += n;
165 p += n;
166 sz -= n;
167 } while (sz);
168}
169
170/* --- @a_flush@ --- *
171 *
172 * Arguments: @int fd@ = file descriptor
173 * @unsigned mode@ = what's happening
174 * @void *v@ = pointer to my admin block
175 *
176 * Returns: ---
177 *
178 * Use: Flushes buffers when a client is ready to read again.
179 */
180
181static void a_flush(int fd, unsigned mode, void *v)
182{
183 admin *a = v;
184 obuf *o, *oo;
185 ssize_t n;
186
187 o = a->o_head;
188 while (o) {
189 if ((n = trywrite(a, o->p_out, o->p_in - o->p_out)) < 0)
190 return;
191 o->p_out += n;
192 if (o->p_in < o->p_out)
193 break;
194 oo = o;
195 o = o->next;
196 xfree(oo);
197 }
198 a->o_head = o;
199 if (!o) {
200 a->o_tail = 0;
201 sel_rmfile(&a->w);
202 }
203}
204
205/*----- Utility functions -------------------------------------------------*/
206
207/* --- @a_write@ --- *
208 *
209 * Arguments: @admin *a@ = admin connection to write to
210 * @const char *fmt@ = pointer to format string
211 * @...@ = other arguments
212 *
213 * Returns: ---
214 *
215 * Use: Sends a message to an admin connection.
216 */
217
218static void a_write(admin *a, const char *fmt, ...)
219{
220 va_list ap;
221 dstr d = DSTR_INIT;
222 va_start(ap, fmt);
223 dstr_vputf(&d, fmt, &ap);
224 va_end(ap);
225 dosend(a, d.buf, d.len);
226 dstr_destroy(&d);
227}
228
229/* --- @a_warn@ --- *
230 *
231 * Arguments: @const char *fmt@ = pointer to format string
232 * @...@ = other arguments
233 *
234 * Returns: ---
235 *
236 * Use: Informs all admin connections of a warning.
237 */
238
239void a_warn(const char *fmt, ...)
240{
241 va_list ap;
242 admin *a, *aa;
243 dstr d = DSTR_INIT;
244
245 if (flags & F_INIT)
246 dstr_puts(&d, "WARN ");
247 va_start(ap, fmt);
248 dstr_vputf(&d, fmt, &ap);
249 va_end(ap);
250 if (!(flags & F_INIT))
251 moan("%s", d.buf);
252 else {
253 dstr_putc(&d, '\n');
254 for (a = admins; a; a = aa) {
255 aa = a->next;
256 dosend(a, d.buf, d.len);
257 }
258 }
259 dstr_destroy(&d);
260}
261
262/* --- @a_trace@ --- *
263 *
264 * Arguments: @const char *p@ = pointer to a buffer
265 * @size_t sz@ = size of the buffer
266 * @void *v@ = uninteresting pointer
267 *
268 * Returns: ---
269 *
270 * Use: Custom trace output handler.
271 */
272
273#ifndef NTRACE
274static void a_trace(const char *p, size_t sz, void *v)
275{
276 dstr d = DSTR_INIT;
277 admin *a, *aa;
278
279 dstr_puts(&d, "TRACE ");
280 dstr_putm(&d, p, sz);
281 dstr_putc(&d, '\n');
282 for (a = admins; a; a = aa) {
283 aa = a->next;
284 dosend(a, d.buf, d.len);
285 }
286 dstr_destroy(&d);
287}
288#endif
289
290/* --- @a_quit@ --- *
291 *
292 * Arguments: ---
293 *
294 * Returns: ---
295 *
296 * Use: Shuts things down nicely.
297 */
298
299void a_quit(void)
300{
301 close(sock.fd);
302 unlink(sockname);
303 exit(0);
304}
305
306/* --- @a_sigdie@ --- *
307 *
308 * Arguments: @int sig@ = signal number
309 * @void *v@ = an uninteresting argument
310 *
311 * Returns: ---
312 *
313 * Use Shuts down on receipt of a fatal signal.
314 */
315
316static void a_sigdie(int sig, void *v)
317{
318 char *p;
319 char buf[20];
320
321 switch (sig) {
322 case SIGTERM: p = "SIGTERM"; break;
323 case SIGINT: p = "SIGINT"; break;
324 default:
325 sprintf(buf, "signal %i", sig);
326 p = buf;
327 break;
328 }
329 a_warn("shutting down on %s", p);
330 a_quit();
331}
332
333/* --- @a_sighup@ --- *
334 *
335 * Arguments: @int sig@ = signal number
336 * @void *v@ = an uninteresting argument
337 *
338 * Returns: ---
339 *
340 * Use Logs a message about SIGHUP not being useful.
341 */
342
343static void a_sighup(int sig, void *v)
344{
345 a_warn("received SIGHUP: ignoring");
346}
347
348/*----- Adding peers ------------------------------------------------------*/
349
350/* --- @a_resolve@ --- *
351 *
352 * Arguments: @struct hostent *h@ = pointer to resolved hostname
353 * @void *v@ = pointer to admin block
354 *
355 * Returns: ---
356 *
357 * Use: Handles a completed name resolution.
358 */
359
360static void a_resolve(struct hostent *h, void *v)
361{
362 admin *a = v;
363
364 a_lock(a);
365 T( trace(T_ADMIN, "admin: %u resolved", a->seq); )
366 TIMER;
367 sel_rmtimer(&a->t);
368 if (!h)
369 a_write(a, "FAIL couldn't resolve hostname `%s'\n", a->paddr);
370 else if (p_find(a->pname))
371 a_write(a, "FAIL peer `%s' already registered\n", a->pname);
372 else {
373 memcpy(&a->peer.sin.sin_addr, h->h_addr, sizeof(struct in_addr));
374 if (!p_create(a->pname, &a->peer.sa, a->sasz))
375 a_write(a, "FAIL couldn't create peer\n");
376 else
377 a_write(a, "OK\n");
378 }
379 xfree(a->pname);
380 xfree(a->paddr);
381 a->pname = 0;
382 selbuf_enable(&a->b);
383 a_unlock(a);
384}
385
386/* --- @a_timer@ --- *
387 *
388 * Arguments: @struct timeval *tv@ = timer
389 * @void *v@ = pointer to admin block
390 *
391 * Returns: ---
392 *
393 * Use: Times out a resolver.
394 */
395
396static void a_timer(struct timeval *tv, void *v)
397{
398 admin *a = v;
399
400 a_lock(a);
401 T( trace(T_ADMIN, "admin: %u resolver timeout", a->seq); )
402 bres_abort(&a->r);
403 a_write(a, "FAIL timeout resolving `%s'\n", a->paddr);
404 xfree(a->pname);
405 xfree(a->paddr);
406 a->pname = 0;
407 selbuf_enable(&a->b);
408 a_unlock(a);
409}
410
411/* --- @acmd_add@ --- *
412 *
413 * Arguments: @admin *a@ = connection which requested the addition
414 * @unsigned ac@ = argument count
415 * @char *av[]@ = pointer to the argument list
416 *
417 * Returns: ---
418 *
419 * Use: Adds a new peer.
420 */
421
422static void acmd_add(admin *a, unsigned ac, char *av[])
423{
424 unsigned long pt;
425 struct timeval tv;
426 char *p;
427
428 /* --- Make sure someone's not got there already --- */
429
430 if (p_find(av[0])) {
431 a_write(a, "FAIL peer `%s' already registered\n", av[0]);
432 return;
433 }
434
435 /* --- Fill in the easy bits of address --- */
436
437 BURN(a->peer);
438 a->peer.sin.sin_family = AF_INET;
439 a->sasz = sizeof(a->peer.sin);
440 pt = strtoul(av[2], &p, 0);
441 if (*p) {
442 struct servent *s = getservbyname(av[2], "udp");
443 if (!s) {
444 a_write(a, "FAIL service `%s' not known\n", av[2]);
445 return;
446 }
447 pt = ntohs(s->s_port);
448 }
449 if (pt == 0 || pt >= 65536) {
450 a_write(a, "FAIL bad port number %lu\n", pt);
451 return;
452 }
453 a->peer.sin.sin_port = htons(pt);
454
455 /* --- If the name is numeric, do it the easy way --- */
456
457 if (inet_aton(av[1], &a->peer.sin.sin_addr)) {
458 if (!p_create(av[0], &a->peer.sa, a->sasz))
459 a_write(a, "FAIL couldn't create peer\n");
460 else
461 a_write(a, "OK\n");
462 return;
463 }
464
465 /* --- Store everything for later and crank up the resolver --- *
466 *
467 * We disable the line buffer until the resolver completes (or times out).
468 * This prevents other commands on the same connection (though the rest of
469 * the system continues regardless), but makes life simpler for the client.
470 */
471
472 a->pname = xstrdup(av[0]);
473 a->paddr = xstrdup(av[1]);
474 selbuf_disable(&a->b);
475 gettimeofday(&tv, 0);
476 tv.tv_sec += T_RESOLVE;
477 sel_addtimer(&sel, &a->t, &tv, a_timer, a);
478 bres_byname(&a->r, a->paddr, a_resolve, a);
479 T( trace(T_ADMIN, "admin: %u resolving hostname `%s'",
480 a->seq, a->paddr); )
481}
482
483/*----- Administration commands -------------------------------------------*/
484
485/* --- Miscellaneous commands --- */
486
487#ifndef NTRACE
488
489static void acmd_trace(admin *a, unsigned ac, char *av[])
490{
491 if (!ac || strcmp(av[0], "?") == 0) {
492 const trace_opt *t;
493 a_write(a, "INFO Trace options:\n");
494 for (t = tr_opts; t->ch; t++) {
495 a_write(a, "INFO %c %c %s\n",
496 t->ch, (tr_flags & t->f) == t->f ? '*' : ' ', t->help);
497 }
498 } else {
499 unsigned sense = 1;
500 unsigned f = tr_flags;
501 const trace_opt *tt;
502 char *p = av[0];
503
504 while (*p) {
505 switch (*p) {
506 case '+': sense = 1; break;
507 case '-': sense = 0; break;
508 default:
509 for (tt = tr_opts; tt->ch; tt++) {
510 if (tt->ch == *p) {
511 if (sense) f |= tt->f;
512 else f &= ~tt->f;
513 goto tropt_ok;
514 }
515 }
516 a_write(a, "FAIL unknown trace option `%c'\n", *p);
517 return;
518 tropt_ok:;
519 break;
520 }
521 p++;
522 }
523 tr_flags = f;
524 trace_level(tr_flags);
525 }
526 a_write(a, "OK\n");
527}
528
529#endif
530
531static void acmd_port(admin *a, unsigned ac, char *av[])
532{
533 a_write(a, "INFO %u\nOK\n", p_port());
534}
535
536static void acmd_daemon(admin *a, unsigned ac, char *av[])
537{
538 if (flags & F_DAEMON)
539 a_write(a, "FAIL already running as a daemon\n");
540 else {
541 a_warn("becoming a daemon");
542 if (a_stdin)
543 a_destroy(a_stdin);
544 if (u_daemon())
545 a_write(a, "FAIL error becoming a daemon: %s", strerror(errno));
546 else {
547 flags |= F_DAEMON;
548 a_write(a, "OK\n");
549 }
550 }
551}
552
553static void acmd_list(admin *a, unsigned ac, char *av[])
554{
555 peer *p;
556 for (p = p_first(); p; p = p_next(p))
557 a_write(a, "INFO %s\n", p_name(p));
558 a_write(a, "OK\n");
559}
560
561static void acmd_ifname(admin *a, unsigned ac, char *av[])
562{
563 peer *p;
564
565 if ((p = p_find(av[0])) == 0)
566 a_write(a, "FAIL peer `%s' not found\n", av[0]);
567 else
568 a_write(a, "INFO %s\nOK\n", p_ifname(p));
569}
570
571static void acmd_addr(admin *a, unsigned ac, char *av[])
572{
573 peer *p;
574 const addr *ad;
575
576 if ((p = p_find(av[0])) == 0)
577 a_write(a, "FAIL peer `%s' not found\n", av[0]);
578 else {
579 ad = p_addr(p);
580 assert(ad->sa.sa_family == AF_INET);
581 a_write(a, "INFO %s %u\nOK\n",
582 inet_ntoa(ad->sin.sin_addr),
583 (unsigned)ntohs(ad->sin.sin_port));
584 }
585}
586
587static void acmd_stats(admin *a, unsigned ac, char *av[])
588{
589 peer *p;
590 stats *st;
591
592 if ((p = p_find(av[0])) == 0)
593 a_write(a, "FAIL peer `%s' not found\n", av[0]);
594 else {
595 st = p_stats(p);
596 a_write(a, "INFO start-time=%s\n", timestr(st->t_start));
597 a_write(a, "INFO last-packet-time=%s\n", timestr(st->t_last));
598 a_write(a, "INFO packets-in=%lu bytes-in=%lu\n", st->n_in, st->sz_in);
599 a_write(a, "INFO packets-out=%lu bytes-out=%lu\n",
600 st->n_out, st->sz_out);
601 a_write(a, "INFO keyexch-packets-in=%lu keyexch-bytes-in=%lu\n",
602 st->n_kxin, st->sz_kxin);
603 a_write(a, "INFO keyexch-packets-out=%lu keyexch-bytes-out=%lu\n",
604 st->n_kxout, st->sz_kxout);
605 a_write(a, "INFO ip-packets-in=%lu ip-bytes-in=%lu\n",
606 st->n_ipin, st->sz_ipin);
607 a_write(a, "INFO ip-packets-out=%lu ip-bytes-out=%lu\n",
608 st->n_ipout, st->sz_ipout);
609 a_write(a, "INFO rejected-packets=%lu\n", st->n_reject);
610 a_write(a, "OK\n");
611 }
612}
613
614static void acmd_kill(admin *a, unsigned ac, char *av[])
615{
616 peer *p;
617 if ((p = p_find(av[0])) == 0)
618 a_write(a, "FAIL peer `%s' not found\n", av[0]);
619 else {
620 p_destroy(p);
621 a_write(a, "OK\n");
622 }
623}
624
625static void acmd_quit(admin *a, unsigned ac, char *av[])
626{
627 a_warn("closing down on admin request");
628 a_write(a, "OK\n");
629 a_quit();
630}
631
632/* --- The command table and help --- */
633
634typedef struct acmd {
635 const char *name;
636 const char *help;
637 unsigned argmin, argmax;
638 void (*func)(admin */*a*/, unsigned /*ac*/, char */*av*/[]);
639} acmd;
640
641static void acmd_help(admin */*a*/, unsigned /*ac*/, char */*av*/[]);
642
643static const acmd acmdtab[] = {
644 { "help", "HELP", 0, 0, acmd_help },
645#ifndef NTRACE
646 { "trace", "TRACE [options]", 0, 1, acmd_trace },
647#endif
648 { "port", "PORT", 0, 0, acmd_port },
649 { "daemon", "DAEMON", 0, 0, acmd_daemon },
650 { "list", "LIST", 0, 0, acmd_list },
651 { "ifname", "IFNAME peer", 1, 1, acmd_ifname },
652 { "addr", "ADDR peer", 1, 1, acmd_addr },
653 { "stats", "STATS peer", 1, 1, acmd_stats },
654 { "kill", "KILL peer", 1, 1, acmd_kill },
655 { "add", "ADD peer addr port", 3, 3, acmd_add },
656 { "quit", "QUIT", 0, 0, acmd_quit },
657 { 0, 0, 0, 0, 0 }
658};
659
660static void acmd_help(admin *a, unsigned ac, char *av[])
661{
662 const acmd *c;
663 for (c = acmdtab; c->name; c++)
664 a_write(a, "INFO %s\n", c->help);
665 a_write(a, "OK\n");
666}
667
668/*----- Connection handling -----------------------------------------------*/
669
670/* --- @a_lock@ --- *
671 *
672 * Arguments: @admin *a@ = pointer to an admin block
673 *
674 * Returns: ---
675 *
676 * Use: Locks an admin block so that it won't be destroyed
677 * immediately.
678 */
679
680static void a_lock(admin *a) { assert(!(a->f & AF_LOCK)); a->f |= AF_LOCK; }
681
682/* --- @a_unlock@ --- *
683 *
684 * Arguments: @admin *a@ = pointer to an admin block
685 *
686 * Returns: ---
687 *
688 * Use: Unlocks an admin block, allowing its destruction. This is
689 * also the second half of @a_destroy@.
690 */
691
692static void a_unlock(admin *a)
693{
694 assert(a->f & AF_LOCK);
695 if (!(a->f & AF_DEAD)) {
696 a->f &= ~AF_LOCK;
697 return;
698 }
699
700 T( trace(T_ADMIN, "admin: completing destruction of connection %u",
701 a->seq); )
702
703 selbuf_destroy(&a->b);
704 if (a->pname) {
705 xfree(a->pname);
706 xfree(a->paddr);
707 bres_abort(&a->r);
708 sel_rmtimer(&a->t);
709 }
710 if (a->b.reader.fd != a->w.fd)
711 close(a->b.reader.fd);
712 close(a->w.fd);
713
714 if (a_stdin == a)
715 a_stdin = 0;
716 if (a->next)
717 a->next->prev = a->prev;
718 if (a->prev)
719 a->prev->next = a->next;
720 else
721 admins = a->next;
722 DESTROY(a);
723}
724
725/* --- @a_destroy@ --- *
726 *
727 * Arguments: @admin *a@ = pointer to an admin block
728 *
729 * Returns: ---
730 *
731 * Use: Destroys an admin block. This requires a certain amount of
732 * care.
733 */
734
735static void a_destroy(admin *a)
736{
737 /* --- Don't multiply destroy admin blocks --- */
738
739 if (a->f & AF_DEAD)
740 return;
741
742 /* --- Make sure nobody expects it to work --- */
743
744 a->f |= AF_DEAD;
745 T( trace(T_ADMIN, "admin: destroying connection %u", a->seq); )
746
747 /* --- Free the output buffers --- */
748
749 if (a->o_head) {
750 obuf *o, *oo;
751 sel_rmfile(&a->w);
752 for (o = a->o_head; o; o = oo) {
753 oo = o->next;
754 xfree(o);
755 }
756 a->o_head = 0;
757 }
758
759 /* --- If the block is locked, that's all we can manage --- */
760
761 if (a->f & AF_LOCK) {
762 T( trace(T_ADMIN, "admin: deferring destruction..."); )
763 return;
764 }
765 a->f |= AF_LOCK;
766 a_unlock(a);
767}
768
769/* --- @a_line@ --- *
770 *
771 * Arguments: @char *p@ = pointer to the line read
772 * @size_t len@ = length of the line
773 * @void *vp@ = pointer to my admin block
774 *
775 * Returns: ---
776 *
777 * Use: Handles a line of input.
778 */
779
780static void a_line(char *p, size_t len, void *vp)
781{
782 admin *a = vp;
783 const acmd *c;
784 char *av[4];
785 size_t ac;
786
787 TIMER;
788 if (a->f & AF_DEAD)
789 return;
790 if (!p) {
791 a_destroy(a);
792 return;
793 }
794 ac = str_qsplit(p, av, 4, 0, STRF_QUOTE);
795 if (!ac)
796 return;
797 for (p = av[0]; *p; p++) *p = tolower((unsigned char)*p);
798 for (c = acmdtab; c->name; c++) {
799 if (strcmp(av[0], c->name) == 0) {
800 ac--;
801 if (c->argmin > ac || ac > c->argmax)
802 a_write(a, "FAIL syntax: %s\n", c->help);
803 else {
804 a_lock(a);
805 c->func(a, ac, av + 1);
806 a_unlock(a);
807 }
808 return;
809 }
810 }
811 a_write(a, "FAIL unknown command `%s'\n", av[0]);
812}
813
814/* --- @a_create@ --- *
815 *
816 * Arguments: @int fd_in, fd_out@ = file descriptors to use
817 *
818 * Returns: ---
819 *
820 * Use: Creates a new admin connection.
821 */
822
823void a_create(int fd_in, int fd_out)
824{
825 admin *a = CREATE(admin);
826 T( static unsigned seq = 0;
827 a->seq = seq++; )
828 T( trace(T_ADMIN, "admin: accepted connection %u", a->seq); )
829 a->pname = 0;
830 a->f = 0;
831 if (fd_in == STDIN_FILENO)
832 a_stdin = a;
833 fdflags(fd_in, O_NONBLOCK, O_NONBLOCK, FD_CLOEXEC, FD_CLOEXEC);
834 if (fd_out != fd_in)
835 fdflags(fd_out, O_NONBLOCK, O_NONBLOCK, FD_CLOEXEC, FD_CLOEXEC);
836 selbuf_init(&a->b, &sel, fd_in, a_line, a);
837 sel_initfile(&sel, &a->w, fd_out, SEL_WRITE, a_flush, a);
838 a->o_head = 0;
839 a->o_tail = 0;
840 a->next = admins;
841 a->prev = 0;
842 if (admins)
843 admins->prev = a;
844 admins = a;
845}
846
847/* --- @a_accept@ --- *
848 *
849 * Arguments: @int fd@ = file descriptor to accept
850 * @unsigned mode@ = what to do
851 * @void *v@ = uninteresting pointer
852 *
853 * Returns: ---
854 *
855 * Use: Accepts a new admin connection.
856 */
857
858static void a_accept(int fd, unsigned mode, void *v)
859{
860 int nfd;
861 struct sockaddr_un sun;
862 size_t sz = sizeof(sun);
863
864 if ((nfd = accept(fd, (struct sockaddr *)&sun, &sz)) < 0) {
865 if (errno != EINTR && errno != EAGAIN && errno != EWOULDBLOCK &&
866 errno != ECONNABORTED && errno != EPROTO)
867 a_warn("accept admin connection failed: %s", strerror(errno));
868 return;
869 }
870 a_create(nfd, nfd);
871}
872
873/* --- @a_daemon@ --- *
874 *
875 * Arguments: ---
876 *
877 * Returns: ---
878 *
879 * Use: Informs the admin module that it's a daemon.
880 */
881
882void a_daemon(void)
883{
884 flags |= F_DAEMON;
885}
886
887/* --- @a_init@ --- *
888 *
889 * Arguments: @const char *name@ = socket name to create
890 *
891 * Returns: ---
892 *
893 * Use: Creates the admin listening socket.
894 */
895
896void a_init(const char *name)
897{
898 int fd;
899 int n = 5;
900 struct sockaddr_un sun;
901 struct sigaction sa;
902 size_t sz;
903
904 /* --- Set up the socket address --- */
905
906 sz = strlen(name) + 1;
907 if (sz > sizeof(sun.sun_path))
908 die(EXIT_FAILURE, "socket name `%s' too long", name);
909 BURN(sun);
910 sun.sun_family = AF_UNIX;
911 memcpy(sun.sun_path, name, sz);
912 sz += offsetof(struct sockaddr_un, sun_path);
913
914 /* --- Attempt to bind to the socket --- */
915
916 umask(0077);
917again:
918 if ((fd = socket(PF_UNIX, SOCK_STREAM, 0)) < 0)
919 die(EXIT_FAILURE, "couldn't create socket: %s", strerror(errno));
920 if (bind(fd, (struct sockaddr *)&sun, sz) < 0) {
921 struct stat st;
922 int e = errno;
923 if (errno != EADDRINUSE) {
924 die(EXIT_FAILURE, "couldn't bind to address `%s': %s",
925 sun.sun_path, strerror(e));
926 }
927 if (!n)
928 die(EXIT_FAILURE, "too many retries; giving up");
929 n--;
930 if (!connect(fd, (struct sockaddr *)&sun, sz)) {
931 die(EXIT_FAILURE, "server already listening on admin socket `%s'",
932 sun.sun_path);
933 }
934 if (errno != ECONNREFUSED)
935 die(EXIT_FAILURE, "couldn't bind to address: %s", strerror(e));
936 if (stat(sun.sun_path, &st)) {
937 die(EXIT_FAILURE, "couldn't stat `%s': %s",
938 sun.sun_path, strerror(errno));
939 }
940 if (!S_ISSOCK(st.st_mode))
941 die(EXIT_FAILURE, "object `%s' isn't a socket", sun.sun_path);
942 T( trace(T_ADMIN, "admin: stale socket found; removing it"); )
943 unlink(sun.sun_path);
944 close(fd);
945 goto again;
946 }
947 chmod(sun.sun_path, 0600);
948 fdflags(fd, O_NONBLOCK, O_NONBLOCK, FD_CLOEXEC, FD_CLOEXEC);
949 if (listen(fd, 5))
950 die(EXIT_FAILURE, "couldn't listen on socket: %s", strerror(errno));
951
952 /* --- Listen to the socket --- */
953
954 sel_initfile(&sel, &sock, fd, SEL_READ, a_accept, 0);
955 sel_addfile(&sock);
956 sockname = name;
957 bres_init(&sel);
958 T( trace_custom(a_trace, 0);
959 trace(T_ADMIN, "admin: enabled custom tracing"); )
960 flags |= F_INIT;
961
962 /* --- Set up signal handlers --- */
963
964 sig_add(&s_term, SIGTERM, a_sigdie, 0);
965 sig_add(&s_hup, SIGHUP, a_sighup, 0);
966 sigaction(SIGINT, 0, &sa);
967 if (sa.sa_handler != SIG_IGN)
968 sig_add(&s_int, SIGINT, a_sigdie, 0);
969}
970
971/*----- That's all, folks -------------------------------------------------*/